Extreme Personal Privacy 2 - Advanced Tactics
What you'll learn
- Defend Yourself Against Online Threat Actors
- Defend Yourself Against Physical World Threat Actors
- Defend Yourself Against Non-Consensual Pornography (also known as "Revenge Porn")
- Extreme Medical Privacy - Protect yourself and your privacy when seeking sensitive medical services, including reproductive health services.
- Protecting Minors from Abuse such as Bullying, Sexual Abuse, and Sextortion
- Develop a Working Alias to Gain Anonymity in Public and from Prying Eyes
Requirements
- It's not a requirement, but the information and tactics shared in the predecessor course, Extreme Personal Privacy, would be helpful in providing broader context and information for developing a comprehensive privacy framework to protect you and those you care about.
Description
Extreme Personal Privacy 2 expands on the fundamental tactics demonstrated in Course #1, providing detailed strategies and resources to actively defend against specific types of threat actors who may seek to violate your privacy and do you harm. Important topics include:
Section 1 - Extreme Privacy and Incident Response
Defend Against Physical World Threat Actors (such as stalkers, harassers, criminals)
Defend Against Online Threat Actors (such as internet trolls and online abusers)
Combatting Non-Consensual Pornography (also known as “Revenge Porn”)
Address Confidentiality Programs (alternative address services offered by many states to help victims of abuse)
Extreme Healthcare Privacy Tactics (protecting your identity and privacy when researching or obtaining sensitive healthcare services, including reproductive healthcare services)
Protecting Minors from Abuse (including in-depth discussions and recommendations on preventing bullying, sexual abuse, and sextortion of minors)
Section 2 – Alias Considerations
Understand the reach of the Government
Developing a Working Alias (including developing an alternate identity, establishing an LLC and obtaining credit cards and other resources to mask your identity from prying eyes and the public).
Extreme Personal Privacy 2 draws upon the book Get Lost: Personal Privacy Strategies for Extremely Busy People, written by privacy experts Daniel Farber Huang and Theresa Menders. Extreme Personal Privacy 2 will show you how to take back control of your privacy and safety. Using clear, concise language and providing step-by-step instructions, this course provides actionable tactics, techniques, and procedures that you can activate immediately.
Who this course is for:
- Anybody who feels their privacy is under threat from
Instructor
Daniel is Entrepreneur-in-Residence at CleanSlate, which helps privacy-concerned individuals regain control of their personal privacy by compartmentalizing critical aspects of their life -- their public-facing persona, work life, private life – and putting the power back in their hands on what they share with whom. CleanSlate helps clients shield themselves from the prying eyes and reach of data-hungry corporations, unfriendly influences, malicious actors, and other threats to personal privacy and safety. Many of the tactics, techniques, and procedures recommended in this book are drawn from CleanSlate's privacy standards.
Daniel has worked closely with numerous federal, state, and local law enforcement agencies across the U.S. on providing solutions to their mobile technology requirements. He has focused on providing hardware and software solutions to federal field agents, investigators, the police, and other authorities to support them in performing their duties. Daniel is a strategic consultant helping a wide range of companies in different industries reduce risks at all levels of their organizations, including financial and cyber security. He has also worked with high-profile, C-suite executives on assessing the personal security frameworks for the executives and their families, including obfuscating their sensitive personal information, residences, and activities from the prying eyes of the public. Daniel earned his Master’s degree in Journalism and Certificate in International Security from Harvard University. During his studies he has gained perspective and insight into the ways governments, non-state actors, corporations, and even lone individuals are using kinetic and cyberattacks not only against each other but also against unsuspecting civilians. Also, he earned his MBAs from The Wharton School, University of Pennsylvania, where he was trained in efficiency so throughout this course we will get right to the point.